DEV Community

loading...

Discussion on: Cryptography for programmers 3: Hashes, MACs & JWT

Collapse
anduser96 profile image
Andrei Gatej

Thanks for such an informative answer!

Maybe the public and private keys approach would be useful when adopting a Microservices architecture, where each service would hold the public key.

Looking forward to your next article!